Patents by Inventor Carl E. Banzhof

Carl E. Banzhof has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8090660
    Abstract: A system is provided for use-based charging of security software. The system includes a security software, a monitor component, and a billing component. The security software provides security for a computer system, and the monitor component is operable to monitor use of at least a portion of the security software. The billing component is operable to charge based on the use of the security software monitored by the monitor component.
    Type: Grant
    Filed: June 8, 2005
    Date of Patent: January 3, 2012
    Assignee: McAfee, Inc.
    Inventors: Steven B. Solomon, Carl E. Banzhof
  • Patent number: 7308712
    Abstract: A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
    Type: Grant
    Filed: December 10, 2004
    Date of Patent: December 11, 2007
    Assignee: McAfee, Inc.
    Inventor: Carl E. Banzhof
  • Patent number: 7278163
    Abstract: A system and method for assessing risks to computer network is provided. The system includes a first module assesses a human factor related to a risk to the computer network. A second module assesses a remediation to the computer network, and a third module is operable to assess a life cycle of an asset on the computer network. A fourth module assesses a type of the asset used by the computer network.
    Type: Grant
    Filed: February 22, 2005
    Date of Patent: October 2, 2007
    Assignee: McAfee, Inc.
    Inventors: Carl E. Banzhof, John Davies
  • Patent number: 7000247
    Abstract: A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
    Type: Grant
    Filed: December 31, 2002
    Date of Patent: February 14, 2006
    Assignee: Citadel Security Software, Inc.
    Inventor: Carl E. Banzhof
  • Publication number: 20030126472
    Abstract: A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
    Type: Application
    Filed: December 31, 2002
    Publication date: July 3, 2003
    Inventor: Carl E. Banzhof